Aug. 22, 2022, 1:20 a.m. | Mayank Pandey, Rachit Agarwal, Sandeep Kumar Shukla, Nishchal Kumar Verma

cs.CR updates on arXiv.org arxiv.org

In cryptocurrency-based permissionless blockchain networks, the decentralized
structure enables any user to join and operate across different regions. The
criminal entities exploit it by using cryptocurrency transactions on the
blockchain to facilitate activities such as money laundering, gambling, and
ransomware attacks. In recent times, different machine learning-based
techniques can detect such criminal elements based on blockchain transaction
data. However, there is no provision within the blockchain to deal with such
elements. We propose a reputation-based methodology for response to the …

blockchain pos

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Compliance Architect - Experian Health (Can be REMOTE from anywhere in the US)

@ Experian | ., ., United States

IT Security Specialist

@ Ørsted | Kuala Lumpur, MY

Senior, Cyber Security Analyst

@ Peloton | New York City

Cyber Security Engineer | Perimeter | Firewall

@ Garmin Cluj | Cluj-Napoca, Cluj County, Romania

Pentester / Ethical Hacker Web/API - Vast/Freelance

@ Resillion | Brussels, Belgium